Cryptanalysis

Results: 756



#Item
291Side channel attack / Data Encryption Standard / Entropy / Correlation attack / RSA / Cryptanalysis / Cipher / Cryptography / Espionage / Power analysis

Improving the Rules of the DPA Contest Fran¸cois-Xavier Standaert⋆ , Philippe Bulens, Giacomo de Meulenaer, Nicolas Veyrat-Charvillon UCL Crypto Group, Universit´e catholique de Louvain, B-1348 Louvain-la-Neuve. e-ma

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-08 08:57:29
292Password authentication protocol / Password / Cryptographic nonce / Information / Cryptographic protocols / Security / Internet protocols / Computer security

Cryptanalysis of the Yang -Wang’s password authentication schemes Jue-Sam Chou1, Ming-De Yang2, Guey-Chuen Lee3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-23 03:33:04
293Equivalence relation / Differential cryptanalysis / Differential equation / ICE / Function / Vector space / Equivalence of categories / Algebra / Mathematics / Linear cryptanalysis

A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT Wentao Zhang1 , Zhenzhen Bao1 , Vincent Rijmen2 , Meicheng Liu1 1.State Key Laboratory of Information Security, Institu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 23:46:18
294Permutation / Cipher / Chosen-plaintext attack / ICE / Cryptanalysis / Block cipher / Data Encryption Standard / Cryptography / Stream ciphers / Ciphertext

C:~hookleeMy ProgramsMATLABHCIEdiff_hist.eps

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-06 07:14:59
295Advanced Encryption Standard / K1 / Differential cryptanalysis / Slide attack / Block cipher / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis Farzaneh Abed, Eik List, Stefan Lucks Bauhaus-University Weimar, Germany {farzaneh.abed,eik.list,stefan.lucks}@uni-weimar.de

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-20 07:31:29
296Public-key cryptography / Key-agreement protocol / Information / Cyberwarfare / Computing / Cryptographic protocols / Certificateless cryptography / Diffie–Hellman key exchange

Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol Qingfeng Cheng Luoyang University of Foreign Languages, Luoyang, PR China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-28 03:05:00
297Cryptography / Communications protocol / Data transmission / Protocols / Error detection and correction / Telecommunications engineering / Coding theory / Data / Information

Cryptanalysis of Secure Message Transmission Protocols with Feedback (Full version of the ICITS 2009 paper with the same title and authors) Qiushi Yang1,? and Yvo Desmedt1,2,?? 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-21 09:52:54
298Statistical theory / Bayesian statistics / Probability theory / Principle of indifference / Principle of maximum entropy / Normal distribution / Bayesian probability / Information theory / Entropy / Statistics / Probability and statistics / Probability

Some Formal Solutions in Side-channel Cryptanalysis An Introduction Fabrice J.P.R. Pautot e-mail to: Abstract: We propose to revisit Side-channel Cryptanalysis from the point of view,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-01-19 04:49:09
299Advanced Encryption Standard / Block cipher / Symmetric-key algorithm / Cryptanalysis / ICE / Blowfish / Cryptographic hash functions / Cryptography / Data Encryption Standard / Stream cipher

Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group Abstract. WIDEA is a family of block ciphers designed by Junod and Macchetti in 2009

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 08:34:51
300Cipher / Cryptography

Cryptanalysis of RCES/RSES Image Encryption Scheme∗ Shujun Li1 , Chengqing Li2 , Guanrong Chen2 and Kwok-Tung Lo3 1 FernUniversit¨at in Hagen, Lehrgebiet Informationstechnik, Universit¨atsstraße 27, 58084 Hagen, Ger

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-04-27 05:30:04
UPDATE